ATE380381T1 - SEMICONDUCTOR MEMORY CARD AND COMPUTER READABLE PROGRAM - Google Patents

SEMICONDUCTOR MEMORY CARD AND COMPUTER READABLE PROGRAM

Info

Publication number
ATE380381T1
ATE380381T1 AT04708024T AT04708024T ATE380381T1 AT E380381 T1 ATE380381 T1 AT E380381T1 AT 04708024 T AT04708024 T AT 04708024T AT 04708024 T AT04708024 T AT 04708024T AT E380381 T1 ATE380381 T1 AT E380381T1
Authority
AT
Austria
Prior art keywords
file
semiconductor memory
memory card
computer readable
null
Prior art date
Application number
AT04708024T
Other languages
German (de)
Inventor
Futoshi Nakabe
Shinji Kawano
Original Assignee
Matsushita Electric Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Ind Co Ltd filed Critical Matsushita Electric Ind Co Ltd
Application granted granted Critical
Publication of ATE380381T1 publication Critical patent/ATE380381T1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C7/00Arrangements for writing information into, or reading information out from, a digital store
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Saccharide Compounds (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The present invention provides a semiconductor memory card which no longer allows an illegal practice of acquiring contents of a deleted file. Here, when a deletion event is generated, a deletion handler gives a priority to a null-clear operation of a file entry and a FAT for a file to be deleted over a null-clear operation to other constituents of the file. A null-clear operation to a file entity of the file is distributed to a plurality of event handlers including the deletion handler.
AT04708024T 2003-02-04 2004-02-04 SEMICONDUCTOR MEMORY CARD AND COMPUTER READABLE PROGRAM ATE380381T1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2003027683 2003-02-04

Publications (1)

Publication Number Publication Date
ATE380381T1 true ATE380381T1 (en) 2007-12-15

Family

ID=32844181

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04708024T ATE380381T1 (en) 2003-02-04 2004-02-04 SEMICONDUCTOR MEMORY CARD AND COMPUTER READABLE PROGRAM

Country Status (10)

Country Link
US (1) US7303135B2 (en)
EP (1) EP1493157B1 (en)
KR (1) KR20050103448A (en)
CN (1) CN100472644C (en)
AT (1) ATE380381T1 (en)
BR (1) BRPI0405222A (en)
CA (1) CA2481852A1 (en)
DE (1) DE602004010458T2 (en)
MX (1) MXPA04012286A (en)
WO (1) WO2004070728A1 (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0511919D0 (en) * 2005-06-11 2005-07-20 Ibm Device permitting partial disabling of information retrievability on worm media
KR101504647B1 (en) * 2006-08-08 2015-03-30 샌디스크 테크놀로지스, 인코포레이티드 Portable mass storage with virtual machine activation
US7725614B2 (en) 2006-08-08 2010-05-25 Sandisk Corporation Portable mass storage device with virtual machine activation
JP4483891B2 (en) * 2007-04-02 2010-06-16 フェリカネットワークス株式会社 Information processing terminal, data movement method, and program
US8694776B2 (en) * 2007-12-21 2014-04-08 Spansion Llc Authenticated memory and controller slave
US9069940B2 (en) 2010-09-23 2015-06-30 Seagate Technology Llc Secure host authentication using symmetric key cryptography
KR20130025223A (en) * 2011-09-01 2013-03-11 삼성전자주식회사 Method for managing memory and image forming apparatus performing the same
US8826459B2 (en) * 2011-11-29 2014-09-02 Jason Swist Systems and methods of automatic multimedia transfer and playback
US8621644B2 (en) 2011-12-29 2013-12-31 Elwha Llc System and method for protecting data stored on a removable data storage device
CN104268184B (en) * 2014-09-16 2017-11-21 青岛海信移动通信技术股份有限公司 File delet method and terminal in a kind of mobile terminal
KR101605156B1 (en) 2014-12-11 2016-03-21 네이버비즈니스플랫폼 주식회사 Device, method, and computer for providing file deleting service
IT201700057287A1 (en) * 2017-05-26 2018-11-26 St Microelectronics Srl PROCEDURE FOR MANAGING INTEGRATED CIRCUIT CARDS, CARD AND CORRESPONDING EQUIPMENT
US11487908B2 (en) * 2019-08-16 2022-11-01 Macronix International Co., Ltd. Secure memory

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS63253493A (en) * 1987-04-09 1988-10-20 Mitsubishi Electric Corp Information recording system
US5479638A (en) 1993-03-26 1995-12-26 Cirrus Logic, Inc. Flash memory mass storage architecture incorporation wear leveling technique
US5434919A (en) * 1994-01-11 1995-07-18 Chaum; David Compact endorsement signature systems
DE19633648A1 (en) * 1996-08-21 1998-02-26 Grundig Ag Method and circuit arrangement for storing dictations in a digital dictation machine
US6507911B1 (en) 1998-07-22 2003-01-14 Entrust Technologies Limited System and method for securely deleting plaintext data
JP3389186B2 (en) 1999-04-27 2003-03-24 松下電器産業株式会社 Semiconductor memory card and reading device
JP4423711B2 (en) * 1999-08-05 2010-03-03 ソニー株式会社 Semiconductor memory device and semiconductor memory device operation setting method
EP1498810B1 (en) 1999-10-21 2018-12-26 Panasonic Corporation A semiconductor memory card access apparatus, a computer-readable recording medium, an initialization method, and a semiconductor memory card
EP1338975B1 (en) * 2000-11-20 2006-06-28 Matsushita Electric Industrial Co., Ltd. Noncontact reader/writer, information communication system using the same, and management system using the same
US7097107B1 (en) * 2003-04-09 2006-08-29 Mobile-Mind, Inc. Pseudo-random number sequence file for an integrated circuit card

Also Published As

Publication number Publication date
CA2481852A1 (en) 2004-08-19
MXPA04012286A (en) 2005-02-25
US20050226072A1 (en) 2005-10-13
DE602004010458D1 (en) 2008-01-17
DE602004010458T2 (en) 2008-04-30
BRPI0405222A (en) 2005-03-15
KR20050103448A (en) 2005-10-31
EP1493157B1 (en) 2007-12-05
EP1493157A1 (en) 2005-01-05
US7303135B2 (en) 2007-12-04
WO2004070728A1 (en) 2004-08-19
CN1698130A (en) 2005-11-16
CN100472644C (en) 2009-03-25

Similar Documents

Publication Publication Date Title
ATE380381T1 (en) SEMICONDUCTOR MEMORY CARD AND COMPUTER READABLE PROGRAM
TW200712975A (en) Methods and apparatus for implementing context-dependent file security
MY149569A (en) Improvements in resisting the spread of unwanted code and data
TR200100939T1 (en) Computer readable media in which the image file is recorded
EP1132801A3 (en) Access monitor and access monitoring method
ATE476694T1 (en) SYSTEM DEVICE AND METHOD FOR MANAGING FILE SECURITY ATTRIBUTES IN A COMPUTER FILE STORAGE SYSTEM
RU2008139610A (en) PERMISSION-BASED TRANSFORMATION OF THE USER INTERFACE
Augustine et al. Infection-iron interaction during COVID-19 pandemic: Time to re-design iron supplementation programs
Cao et al. Rates and trends in stage‐specific prostate cancer incidence by age and race/ethnicity, 2000–2017
Nallamothu et al. Perceived impact of the COVID-19 pandemic on orthodontic practice in the Middle East
Rihs et al. The new latex allergen Hev b 15: IgE-binding properties of a recombinant serine protease inhibitor.
Belglaiaa et al. Cervical cancer: Current situation and management in Morocco
Shree et al. Analytical Study of Mandible: Prerequisite for Sex Determination
Chowdary et al. Prevalence of traumatic dental injuries in primary teeth: A retrospective study
Cui et al. Excess Mortality for Femoral Intertrochanteric Fracture Patients Aged 50 Years and Older Treated Surgically and Conservatively in Tianjin, China: A Cohort Study
EA200600651A1 (en) SYSTEM, METHOD AND DEVICE FOR DOWNLOADING TEXT DATA INTO THE DATABASE
Razmahov EVALUATION OF THE PERFORMANCE OF BANKRUPTCY OF CITIZENS
JP6196848B2 (en) Information processing apparatus, information processing method, and program
Scott Why do immunology research in hemophilia?
Blazekovic et al. HLA-DR peptide occupancy can be regulated with a wide variety of small molecules
Haruka et al. OSNC1: Effect of Direct Retainer Types of Dent-Maxillary Prosthesis in Maxillectomy Patients: An: In Vitro: Study
Peternelli Program R: applications in plant breeding
Patel Analysis of Cyclophilin A Levels in Subarachnoid Hemorrhage Patients
Ramesh Vertex extradural hematoma
Prochaska Interfering with Zearalenone: Insights into Competitive Inhibition, Enzyme Interference, and Antioxidant Phytochemicals

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties